Professional Documents
Culture Documents
Jan Mulligan
Project report submitted in part fulfilment of the requirements for the degree of
Master of Science (Human-Computer Interaction with Ergonomics) in the Faculty
of Life Sciences, University College London, 2009.
I would like to thank my supervisors Rachel Benedyk and Nadia Berthouze for
their advice and support throughout this study.
My thanks go to the participants, who gave generously of their time. The study
would not have been possible without them. Thanks also to Kerstin Frank for her
technical skills and patience as I prepared my CIMS Acceptance Model.
Thank you to my friends and family for their constant support and good wishes.
ii
Abstract
iii
Table of Contents
1 Introduction 1
2 Methodology 14
2.3 Conventions 18
3.3 Validation 35
3.3.1 Stage 1 (Survey) 35
3.3.2 Stage 2 (Interview) 35
4 Discussion 36
4.2 Trust 37
4.2.1 Trust in Technology 37
4.2.2 Trust in CIMS Methods 38
4.2.3 Trust in the Employer 38
4.3 Purpose 39
4.3.1 Consultation 39
4.3.2 CIMS as an Emotion-state Changer 40
4.3.3 CIMS as a Social Actor 40
4.4 Autonomy 40
4.4.1 Choice 40
4.4.2 Control 41
4.5 Privacy 41
5 Conclusion 51
6 References 53
Figures Page
vii
Appendices Page
viii
1. Introduction
It is estimated that 2.1 million people in the United Kingdom (UK) are suffering
from “an illness they believed was caused or made worse by their current or past
work” (Health and Safety Executive, 2009). Just over two thirds of that figure
may be accounted for by musculoskeletal disorders (539,000) and stress,
depression or anxiety (442,000). Work-related ill health is not a new
phenomenon. In the 18th century Bernardino Ramazzini, credited as being the
founder of occupational medicine, extensively documented work-related ill
health. When observing scribes and considering their related disorders
Ramazzini reported:
Despite awareness of these issues for over three centuries, individuals continue
to experience work-related musculoskeletal disorders and stress-related ill
health. This study considers ways in which contributing factors, such as emotion
state, work habits and ill-advised postures adopted by work-based computer
users, today‟s scribes, may be detected. It also considers some of the barriers
that exist to prevent individuals taking advantage of related interventions.
Repetitive Strain Injury (RSI) is a recognisable term to most office workers. RSI
has two classifications: Type 1 and Type 2. Type 1 RSI refers to well defined,
diagnosable conditions such as carpal tunnel syndrome (pain and compression
in the wrist) and tendonitis (inflammation of a tendon). Repetitive tasks can
cause these conditions, but they are not the exclusive cause. Type 2 RSI refers
The lack of a clear diagnosis/definition for diffuse RSI means that the term is
interchangeable with others: Occupational Overuse Syndrome (OOS),
Cumulative Trauma Disorder (CTD), Upper Limb Disorder (ULD), which relates
specifically to the upper body, and Musculoskeletal Disorders (MSD) that may
affect the muscles, tendons, ligaments, nerves or other soft tissues and joints in
any part of the body. The HSE differentiates MSDs from other terms as the
symptoms may occur outside of the work environment and then be made worse
by work (Health and Safety Executive, 2007a). Where symptoms are attributable
to the workplace, the term “work-related” may be added, e.g. WRMSD.
The high level of MSDS reported by the HSE (2009) may be partly explained by
their being influenced by biomechanical, psychological and/or psychosocial
factors (Armstrong et al, 1993; Turk, 1993) and as such have a greater number
of potential causes. Armstrong et al proposed a conceptual model for work-
related neck and upper-limb MSDs that is based on sets of cascading exposure,
dose, capacity and response variables, such that “response at one level can act
as dose at the next” (Armstrong et al, 1993).
Biomechanical Loading
External Internal Loads
Loads
Physiological Responses
Individual Factors*
Internal Tolerances
Mechanical Strain
Organizational
Factors
Fatigue
Outcomes
Pain / Discomfort
Social
Context
Impairment / Disability
Discomfort and pain may be precursors of injury, but studies have shown that
whilst MSDs may be incident dependent, e.g. excessive force caused by an
accident, they are more often cumulative in nature. Resulting from repeated or
prolonged low level physical stress on the body, incidents may go unnoticed if
they are insufficient to trigger the body‟s warning system, i.e. pain. If the
task/posture held is repeated with insufficient rest/recovery time, then the
cumulative effect is what is more likely to trigger pain. Consequently, diagnosis
attempts may wrongly focus on the onset of pain; considering recent events,
rather than long term practices, work habits and/or postures adopted by the
individual. To illustrate, computer work involves dynamic and static muscle
loading. Both may result in injury if not well managed, but the contribution of the
static loading element is often overlooked as its impact is less obvious to the
individual. Rapid movement of the fingers during typing places a dynamic load
on the muscles in the hands and fingers that can result in aches and pains
attributable to repetitive actions and/or over-use. Insufficient rest breaks away
from the activity may result in strain and the possibility of cumulative-based
injury. Whilst the fingers are directly deployed in the activity, the muscles of the
Symptoms vary with time and between individuals. Turk (1993) reported how
individuals discussing what appears to be the same phenomenon may describe
significant differences in terms of “severity, quality and impact of their pain”.
Consequently, it is important that not only the somatic (sensory) component of
pain is considered, but other factors such as the individual‟s attitudes, coping
efforts, resources, moods/emotion-states, and stress levels. Observation
provides additional data on an individual‟s symptoms or their attitude to pain,
with behaviours such as facial expression (e.g. grimacing) when considering
activities that trigger pain or (un)conscious rubbing, supporting or gesturing to
affected areas (Turk, 1993; Marcus et al, 2007).
Studies have considered the role of psychosocial factors and stress in the
occurrence of MSDs (Westman et al, 2008). Factors influencing performance
and work demands include: personality; self-efficacy; job satisfaction; autonomy;
monotony; boredom; with work stress, fatigue and attention being of particular
interest to the ergonomist (Halsegrave and Corlett, 2005, p816).
In the workplace, the impact of stress on the individual may include tension,
headaches and MSDs, leading to errors, drops in productivity and possible need
for sick leave. In a systematic review of literature, Michie and Williams (2009)
identified the key work factors associated with work-related psychological ill
heath and sickness absence, which included: long hours worked, work overload
and pressure, lack of control over work and lack of participation in decision
making. In addition, factors external to the workplace such as home and social
life may be common sources of stress; compounding those experienced during
the working day (Tennant, 2001) and contributing to MSDs (Cole and Rivilis,
2004).
Stress may also be task dependant, e.g. computer-related stress. This occurs
when something unforeseen happens, such as a technical fault or software
which blocks a user‟s desired action whilst failing to offer explanation or
guidance as to how to proceed. Depending on the individual‟s technical abilities,
The levels of work-related illness reported by the HSE might suggest a lack of
legislation to protect workers, but this is not the case. Employees within the UK
are protected by a raft of health and safety legislation which covers both the
workplace and work practices. The “Health and Safety (Display Screen
Equipment) Regulations 1992 as amended by the Health and Safety
(Miscellaneous Amendments) Regulations 2002” exists specifically to protect
work-based computer users.
The Display Screen Equipment (DSE) Regulations came into force in January
1993 to implement European directive 90/270/EEC; the aim of which was to
address the minimum health and safety requirements for work with DSE.
Table_1 shows the seven primary DSE Regulations.
The HSE figures (2009) relate to all forms of work, not just computer use.
Despite anecdotal evidence that over 60% of work-based computer users have
experienced symptoms that may be caused/aggravated by computer work
(AbilityNet, 2008), extensive review of literature failed to reveal any current
computer-related statistics. One explanation for this may be that health and
safety surveys gather data on symptoms and accidents/injuries rather than
ongoing conditions. Related data came from research studies on specific user
groups, e.g. Suparna et al (2005) considered the occupational health problems
and role of ergonomics in information technology professionals, or from
industry/media estimates. Bannerjee and Sharan (2003) estimated that 25% of
computer users world-wide had computer-related injuries. The Trade Union
Congress (TUC) (2004) estimated that 1 in 50 of UK workers was experiencing
some degree of RSI. More recently, The Chartered Society of Physiotherapy,
citing HSE figures from 2007/08, called on the UK Government to encourage
employers to do more to prevent and reduce related conditions amongst workers
(The Chartered Society of Physiotherapy, 2009).
Whilst the main responsibility under the DSE Regulations lies with employers
and their nominated representatives, individual computer users have a legal
responsibility to enforce the regulations in order to protect themselves, their
colleagues and visitors and to ensure that risks are reduced by following safe
working practices. Studies have shown that employees are often unaware of
their employer‟s health and safety and DSE procedures (Mulligan, 2006) and
that, even when they are, users need help in order to maintain long-term
compliance with injury prevention programs (Monsey et al, 2003). Potential
barriers to compliance and adoption of good practice may include:
1.2.3 Intervention
DSE Regulations 6 and 7 stipulate that users must be provided with training and
information in health and safety aspects of computer work. Studies have shown
that education programs can reduce the severity or occurrence of MSDs
(Olafsdottir, 2004; Greene et al, 2005). If user education were sufficient in the
battle against MSDs then other interventions would not be required; this is not
the case as demonstrated by Montreuil et al (2006).
1.3.1 Background
Morse et al (2001) found that in the American State of Connecticut there was
substantial under-reporting of MSD, with estimates of unreported cases
exceeding those officially reported by a factor of 11:1. With individuals unable to
recognise risk, the challenge in the prevention of MSDs is how to achieve early
detection of risk factors before symptoms occur. Haque (2000) proposed the use
of a health surveillance system in order to monitor health and safety in the
workplace, data collection through self-administered questionnaires completed
by employees, managers or supervisors, with feedback resulting from data
analysed by trained staff. With advances in technology, and from a Human
Computer Interaction (HCI) viewpoint, the development of a system which could
monitor the user, detect where and when potential risk exists and then provide
advice as to remedial action to be taken, might now appear to be a more obvious
way of plugging the human awareness gap. This study considers the potential
use of prospective Computer-based Interactive Monitoring Systems (henceforth
referred to as “CIMS”). By developing CIMS around persuasive technology
(captology) and user interaction, the computer and user may work together to
address physical, psychological and psychosocial factors of MSDs with the
ultimate aim of improving user well-being.
Fogg (1998) introduced the term “captology”, which derives from the study of
“Computers As Persuasive Technologies”, to explain where technology and
persuasion overlap. He stressed the need to understand both the effects and
potential of interactive technologies that have the ability to “change beliefs and
behaviours”. Understanding informs design, especially when trying to persuade
users to “change attitudes and behaviours in beneficial ways”. Fogg illustrated
the two domains (computers and behaviour) and their interaction/overlap
(captology) through a Venn diagram. The current version is shown in Figure_2.
In order to detect emotional information one must first capture data about the
individual‟s physical state and/or behaviour. This may be achieved via one or
more of the following methods: body posture, gestures, facial expressions,
speech patterns and physiological sensing. In order to recognize emotional
information, meaningful patterns must be identified from the data. At MIT‟s
Affective Computing Lab research into physiological sensing is currently focusing
on: Galvanic Skin Response (GSR), Electrocardiogram (EKG), Electromyogram
“...those who sit at their work and are therefore called 'chair workers ...
[T]hese workers ... suffer from general ill-health and an excessive
accumulation of unwholesome humors caused by their sedentary life ....”
(sic) (Ramazzini, 1713b)
The ultimate aim of CIMS is to improve user well-being. This would be achieved
through the proposed CIMS:
monitoring the work-based computer user across the working day
detecting the individual‟s ergonomic state (e.g. posture, use and position of
equipment and furniture, work tasks, work habits, local environment) as well
as her/his psychological state (e.g. attention, fatigue, frustration and stress
levels, emotions)
and
providing advice on what remedial action may be taken.
These and other questions will be considered by way of two data collection
stages:
Stage 1: a survey that considers the factors that might influence an
individual‟s potential acceptance (welcome, tolerate or rejection) of CIMS
Thematic analysis of the data will establish potential users‟ concerns of and
requirements from CIMS (Chapter 3) and this will be followed by discussion of
the results and major findings (Chapter 4).
The study comprised two primary data collection stages: Stage 1 (survey) and
Stage 2 (interview). The survey‟s purpose was to identify factors influencing an
individual‟s potential acceptance (welcome, tolerate or rejection) of CIMS. One-
to-one, semi-structured interviews at Stage 2 considered the issues identified by
survey feedback and explored points of interest raised by the participants. At the
analysis stage feedback was sought from the interview participants in order to
confirm that their views had been accurately reflected and to request any post-
interview thoughts. The three collection methods enabled data triangulation.
For the purposive sampling method personalized invitations were sent out to 95
individuals, all of whom were known to the researcher in some capacity, e.g.
client, colleague, acquaintance, friend, family member. The invitations explained
the purpose of the study and contained a copy of the survey, which in turn
contained a copy of the study Information Sheet (see Appendix_1, 2 and 3). 93
invitations were emailed and 2 were posted.
An Informed Consent Form was not used for the survey stage of the study, as
return of the completed questionnaire was taken as consent to participate.
Table_4 lists the CIMS categories which formed the basis of the investigation;
selected in order to cover both physical and emotion-state detection methods.
The categories were presented as examples, which might be used on their own
or combined to form multi-factorial CIMS. Participant suggestions for other
detection methods (Survey Question 39 (Appendix_6c)) informed Stage 2.
Interviews were held at the interviewee‟s preferred location; nine (9) choose their
employer‟s premises, two (2) their own home (also serving as a working
location), one (1) by telephone and one (1) by email. Before each interview, the
purpose of the study was re-explained and outstanding questions addressed.
Interviewees were asked to read and sign the Informed Consent Form. An option
to amend the form was provided, e.g. crossing through or re-wording any part.
Informed consent was acquired via email correspondence for the remote
interviews.
In-person interviews were recorded by audio digital recorder; key points and
observation notes recorded in writing. Technical issues with sound quality
rendered audio recording unworkable for the telephone interview; the interview
was recorded in writing.
The questions and interview process were piloted with the two study volunteers.
This proved invaluable as it highlighted where questions provided insufficient
At the end of the interview session, thirteen images of work and computer-based
situations were shown to the interviewee singularly (Appendix_5). The purpose
of this was to elicit instinctive reactions to each image/situation depicted and to
establish whether or not the interviewee perceived there to be any risk, in terms
of physical and/or emotion-state.
Qualitative analysis identifies emerging categories, themes and theories from the
data, rather than trying to establish whether data meet with prior knowledge or
ideas (Greenhalgh and Taylor, 1997). Guidelines are applied flexibly to meet the
2.3 Conventions
Table_6 lists the abbreviation conventions used throughout the rest of this paper:
Abbreviation Description
Pn(g) Participant number (followed by gender)
e.g. P21(F) relates to Participant Number 21 (who is
female)
SQn Survey Question number
e.g. SQ12 relates to the survey question which asks
“Where is your primary workstation/desk location?
IQ-an Interview Question number
e.g. IQ-B3 relates to the interview question which asks
“How do you measure the success of a strategy?”
Table_6: Abbreviation Conventions Used in Paper
Whilst a qualitative approach has been taken in this study, it was necessary and
beneficial to conduct qualitative and quantitative analysis on the data. In Stage 1
(Survey) participants were encouraged to provide comments to qualify
responses and provide additional feedback. Few took advantage. As a result, the
scope for qualitative analysis was limited and a predominantly quantitative
approach was taken, with totals and/or percentages illustrating how participants
responded (Section 3.1). By comparison, Stage 2 (Interview), where transcripts
of the interviews provided the bulk of the data, a predominantly qualitative
approach was possible (Section 3.2).
38 surveys received.
Age 21-30 11 29
21-40 11 29
41-50 4 11
51-60 12 32
Every participant spent at least 3 hours at their work computer each day (55%
“between three and six hours” and 45% “between six and eight hours”). When
asked whether or not their employer provided DSE assessments:
82% replied “yes”
3% “no”
8% “don‟t know”
8% did not answer.
No DSE DSE
Time spent Compliance Compliance Total
n % n % Total %
Less than 1 hour 2 29 5 13 7 18
Between 1 and 2 hours 1 14 16 42 17 45
Between 2 and 3 hours 3 43 9 24 12 32
3 hours or more 1 14 1 3 2 5
7 100 31 100 38 100
Table_8: Analysis of feedback from Survey Question 14:
“What might be the longest length of time you spend working at your
computer before taking a break, i.e. short break away from the computer
for telephone calls, paperwork, filing, photocopying, comfort break?”
Chart Notes:
The Y-axis labels for the charts shown here have been truncated to
save space and allow the data to dominate.
Full data labels may be found in the survey (Appendix_2).
When asked to map their symptoms to body areas, (SQ28: “Please indicate
which area(s) bother you”), as anticipated from literature reviews and
professional knowledge of computer-related MSDs, participants identified
symptoms within the upper body and lower arm as being of most concern (88%)
(Figure_6). Despite anecdotal evidence that most of the participants experience
degrees of stress, tension or fatigue, only 5% declared these as health concerns.
Rank Location n %
1 Lower back 10 25
2 Shoulder 8 20
3 Neck 5 12.5
4 Head 4 10
4 Eyes 4 10
6 Hand 3 7.5
7 Upper back 2 5
7 Hips 2 5
9 Shoulder blade 1 2.5
9 Wrist 1 2.5
11 Other locations were not selected 0 0
40 100
Table_9: Ranked positions for Survey Question 29:
“Please indicate which area(s) bothers you MOST”
In terms of discussing their symptoms with others, the top three selections were:
DSE assessor: 16 (24%)
Family: 14 (21%)
GP/doctor: 9 (13%).
Four (4) participants admitted not discussing symptoms with anyone. Reasons
are shown in Appendix_6b.
Figure_7 shows how the participants responded to SQ35, SQ36, and SQ37
which asked if they would “welcome”, “tolerate” or “reject” example CIMS;
participants were asked to “select all that apply” for each category of
acceptance. As the chart shows, CIMS relating to equipment use, position and
posture achieved higher levels of acceptance than those focusing on emotion
recognition; this finding was supported by Stage 2 (Interview).
Table_10 shows the CIMS ranking provided from SQ38, where participants were
asked: “From those methods which you would either WELCOME or TOLERATE,
which detection method would you find MOST acceptable?”. These results
confirm the participants‟ higher acceptance of physical over emotion recognition
systems.
One explanation for the weighting towards physical methods might be perceived
familiarity. 79% of survey participants reported never using an ergonomic, work
or symptom-based break utility (commercially available persuasive technology).
As the physical CIMS methods use familiar entities, e.g. the keyboard, pointing
device, and user‟s posture, it may have been easier for participant‟s to imagine
how they might be used to monitor and detect risk(s). Participants had no frame
of reference for the facial expression, eye and voice-related methods.
At the end of the survey participants were invited to make final comments / study
observations (Appendix_6d). The majority supported the survey data trends, i.e.
employers are not as proactive as they should/could be and individuals feel that
they should be able to manage their own well-being. The level of symptoms
reported support the first trend, but indicate that despite their beliefs individuals
are unable to self-manage.
For IQ-A1, C and G participants were presented with the word grid shown in
Figure_4 and asked to select all of the words applying to the question presented.
For IQ-A1, “If you experience symptoms whilst working (or as a result of
working), e.g. stress, headaches, eyestrain, physical discomfort, how/what does
that make you feel?”, negativity was the dominant feeling (70% of responses).
The word cloud shown in Figure_8 depicts the dominance of each word; where
word size is based on the number of times that word was selected from the grid
(the colour/shade of the words in the cloud has no relevance). The words
“impatient” and “irritated” dominate (11 and 9 responses respectively).
Word Occurrence
Impatient 11
Irritated 9
Inefficient and Frustrated 5
Annoyed, Compromised, Anxious, Ineffectual, 4
Preoccupied, Depressed
Uneasy, Pensive, Disappointed, Fear, Satisfaction, 3
Dispirited, Worried, Defiant, Weak, Bored, Indifferent,
Thoughtful
Remaining words 2
For IQ-C, “If you decide to take a work or rest break away from your computer,
how/what does that make you feel?”, the overall feeling was one of positivity
(57%). The top two responses were positive in nature, being “relieved” and
“relaxed” (5 responses each), with “uneasy”, “irritated” and “comforted” sharing
third place (3 responses each).
For IQ-G, “If the system advised you to take a work or rest break away from your
computer, how/what would that make you feel?”, despite the top two responses
being negative, “annoyed” and “irritated” (5 responses each), positive words
occupied 10 out of the next 11 positions, resulting on an overall positive
response (60%).
Following each interview recordings and notes were transcribed and initial
analysis conducted. Reading of transcripts informed subsequent interviews and
provided direction for literature reviews (Table_5: Level 1). The transcripts were
analyzed on a line-by-line, sentence or paragraph basis according to relevance
of content, i.e. at what level meaning could be attributed. Codes were assigned
to data segments (Level 2). Whilst themes began to emerge (Level 3), it was not
until all transcripts had been coded that meaningful review could take place in
order to confirm over-arching themes, sub-themes and which were not supported
by other transcripts (Level 4).
Coding allowed for themes and sub-themes to be analysed for frequency and
relevance (Table_11). Refinement of the themes identified where overlapping
occurred and allowed for clearer definitions and naming (Table_5: Level 5), e.g.
it was possible to blend “Change” in to “Coping Strategies” to form a single
theme which reflected “actions which the individual instigates for her/himself in
order to prevent or mitigate symptoms”. Further analysis identified that the theme
could be dropped from the study as most were likely to continue whether or not
the user had access to CIMS.
Taking “trust” as a theme in its own right, the main issues raised by participants
were: trust in technology; trust in CIMS (emotion recognition versus posture
recognition); and trust in their employers.
Before considering their potential for trust in CIMS per se, several clarified their
view of technology in general:
P1(F): “Well, like all computer systems, I am very sceptical of their working
100 per cent of the time”
P10(F): “... you know, every computer system that kind of thing crashes or has
little gremlins that might make the data that is related to me slightly
flawed and then might make me adjust in a way which not necessarily
relevant” (sic)
P14(F): “... I think I would only want to use something that was automated or
computer driven, if before that I had had a person actually go through
with me the kind of messages it should be telling me and then if I did
have a problem, like the video was telling me to lean to the left, then it
would have been explained to me that occasionally it would tell me to
lean to the right, but to ignore it and all of that kind of thing. So, yeah, I
wouldn't want to just solely trust the system”
P18(F): “... I see it as a supportive system. I would definitely not rely on it. I
wouldn't sit and wait for it that it hasn't reminded me to whatever ... it is
to help me do a better job. I can't base my performance on it. I
wouldn't be too fussed if it forgot to ping when it wasn't working today.
That would be fine. I wouldn't put that much reliance on it”.
When asked to rank the example CIMS in terms of trust, where “1” represents
the system they would trust most and “9” represents the system they would trust
least, there was a clear divide between those systems participants perceived as
being able to measure something in time and space, e.g. mechanical use of
equipment (e.g. force, frequency, time), location/position of equipment and/or
user, compared with systems participants felt were more open to interpretation,
e.g. facial expression, voice monitoring (Table_12).
A Keyboard use 1
(e.g. key action (force/pressure used), position
of keyboard on work surface, number of
presses)
D Seated position 5
(e.g. fully in chair with back supported,
perched, fidgeting)
F Facial expression 6
(e.g. frowning, eyebrow positions)
H Eye gaze 6
(e.g. rapid movement, lack of movement,
tracking eye gaze across screen)
G Eye size 8
(e.g. changes can indicate mood)
I Voice monitoring 8
(e.g. detecting the volume of your speech,
tone, words used etc)
P18(F): “Keyboard use would definitely be number one and pointing device
number 2. Much more likely to trust something that I can see ...
understand how it measures, so posture ones I would trust more”
P31(F): “I think to use the words in the survey, I would "tolerate" the computer
commenting on a few things like your body posture or your distance
from the screen, ... even when I think of it watching my eye
movement..... ok... but, when it comes to the system analysing other
things through facial expression then I don't think ... those things just
feel, personally I don't think the technology could accurately tell me
more than I would know myself. ..... I think my earlier comments were
based around the belief that the technology is not sophisticated
enough to make those judgements about your moods, so therefore it's
invalidated in my head”
Trust in employers elicited very mixed responses from participants, ranging from
complete faith to complete mistrust.
When asked how she would feel if the system saved the data so that her
employer could review it, participant 5 responded:
P5(F): “Yeah, that's an interesting one. (pause). Uh, yes, if they were using it
to improve your working situation. I don't, know, uhm, that's tricky. I
say, yes. You have to trust your employers”
P18(F): “I would want assurance that it was not going to be used against me,
not personally, but as an employee. I think it should come with an
assurance that those who agree to it ... that it isn't used against them”.
P23(M): “I'd want to know exactly the fact that they are doing it or wanting to
get access to it. I'd want to be in a position to give permission or not.
We all know how well people can present reasons for doing
something, but it comes back to trust”
P21(F): “... so if they are doing it remotely and monitoring use of their
equipment that's one thing, but then monitoring me as a piece of
equipment that's quite different”
P31(F): “I wouldn't like it at all. Not at all, no (employer having access to data).
In the worst case, it could be used as evidence against you”
3.2.4 Purpose
P15(F): “....I mean obviously it would have benefits because if there were any
changes that need to be made, you could sort of say this and this has
been logged please could I have a different keyboard to help me that
kind of thing .... so, supportive rather than ammunition against me”
In terms of how CIMS would meet its goal supporting the individual, the following
suggestions were made:
P5(F): “I think that I would want them (CIMS) to monitor anything that could
be damaging long term, so that if I continue doing it, like, a couple of
months or whatever, .... yeah, I wouldn't want it to pick up on little
things that didn't really matter because that would be annoying”
P14(F): “ ... if I felt that I was anxious and couldn't really understand why then
maybe something that would monitor your stress or emotions would be
From iterative analysis of the transcripts it was possible to rename “Choice and
Control” to “Autonomy”, i.e. personal independence, an individual‟s right to
choice and control.
P1(F): “I would not want to be prevented from getting on with the task in
hand. Cos that affects my autonomy and anything that affects my
autonomy goes against the grain with me in any context (laughs) I
know myself well enough these days (laughs). So, to be told that I
can't use my computer because the computer says so would have me
throwing it through the window”
P21(F): “I suppose the question is ... at what point would I decide it is too much
and leave”
When considering the practicalities of using CIMS, participants had a wide range
of preferences and suggestions. Each voiced her/his preferences and dislikes,
but there were few commonalities. By providing the user with control over CIMS
settings and incorporating multiple modalities, such as text, graphics,
animations, video and audio, CIMS may be customised to meet individual
changing needs, e.g. several interviewees raised the issue of not wishing to
have audio as that would not only alert her/him to the system‟s prompt, but also
3.2.6 Privacy
In answer to the specific privacy questions (IQ-I1, and I2), most participants
could not readily recognise an issue. Once the conversation delved deeper into
the issues surrounding methods of data capture, data storage/format, and so on,
the comments made by participants indicated where trust issues might come into
play:
P15(F): “... I don't know that I would just want it to be free information because,
again, people would interpret it in a different way, mmm ... yeah..... I
suppose I would have a reservation, because once it's logged, IT IS
logged, if that makes sense”.
P17(F): “I'd want it on my hard drive, others would be wary, sensitive, all sorts
of issues … want it to be secure. I'd want to be the only person who
could get at it, so yes, passworded, encrypted etc.”
P31(F): “I like the idea of it only being accessible by me and not by system
operators.... The control for that data that is saved needs to be in my
hands completely”
Another privacy factor was with those detection and reporting methods which
had the potential to identify individuals, and so encroach on their privacy. For
some it was a matter of voicing concern which might need further consideration:
P10(F): “Not major issues, but I am not overly keen on the last three, eyesight,
eyegaze and voice monitoring. The others I have no issue with at all,
but they (last three) just seem a bit more personal and, you know, I am
very identifiable by my eyes and my voice whereas my posture if, you
know, you can't see my face too much, then ...... (shrugs)”
P16(M): “I think I don't like sounds like beeps and that, cos I think that would be
invasive for colleagues so, sort of a system of messages popping up
on the screen. I'd know it was happening, but other colleagues
wouldn't”.
P23(M): “I think possibly the monitoring using cameras, it's more intrusive of
privacy, but there again I think if the user is in control of implementing
such a thing then you are doing it for your own benefit ... but I think,
again, it depends how it is implemented and about the understanding
that people are given”
P21(F): “I have concern for .... voice monitoring, eye gaze eyesight, facial
expression, even ... because you really do need a lot of detail to
identify those. Upper body, seated position, head position ... you still
need to see me, but they could have less detail, I suppose, so it could
be more anonimised. So, less concern, but still ....no. So, mouse and
keyboard use or position ... but it's just annoying, I don't want it telling
me that. I don't want it telling me that I am hitting something to hard ...
maybe I am, but not being a typist either, so maybe if I was typing
loads of stuff, but its just .... no”.
P30(F): “I would have privacy issues with both the above (emotion and posture
monitoring) because the data could be used by insurance companies,
potential employers, existing employers, hospitals, and if it was shown
that I had ignored advice this would be detrimental to me because they
might refuse to pay out on a claim or employ me, oh all sorts of things”
3.2.7 Self
P2(F): “(a) coping strategy would just be I suppose, changing posture, but
then that's already when you have noticed that you have the strain
somewhere so as much as it is beneficial it is not really because you
have already incurred the strain so it's only beneficial for a time
afterwards”
P14(F): “ ... even though I am aware that I need to sit differently it is not always
easy to remember to notice that you are not”
P31(F): “You know, you asked me if I'm comfortable and I am never aware if I
am comfortable or not. It's almost like I don't know what comfortable is.
As soon as I consider the question I almost become uncomfortable
just from that thinking process, so I am never sure what is really what”
With the photographic images used at the end of the interview, it had been
anticipated that participants with physical symptoms would rate risk from
3.3 Validation
As the participants had completed the surveys themselves it was not necessary
to seek validation on their responses.
Participants quoted in the paper received copies of Section 3.2 and were asked
to verify that their views had been accurately represented. One modification was
requested.
Analysis revealed that experience of symptoms does not necessarily mean that
individuals readily welcome intervention (Nieuwenhuijsen, 2004). Potential
barriers exist that may prevent users from accepting CIMS as a part of their MSD
intervention program. Trust was identified as a gateway to acceptance (trust of
technology; CIMS method(s); and the employer); with “Purpose” (of CIMS),
“Autonomy”, and “Privacy” closely linked to the individual‟s ability to trust CIMS
and employers‟ deployment of it. In addition, the individual must be able to trust
her/his self. These five potential barriers need to be considered, and where
necessary addressed, in order for the individual to be in a position to make an
informed decision whether or not to become a CIMS user.
This chapter will consider each barrier, relating these barriers and the ethical
factors that surround persuasive technologies to current literature, before
introducing a CIMS User Acceptance Model.
Some of the themes and concerns raised by the study participants surround
ethical use of CIMS. When captology and persuasive technology were in their
infancy, Berdichevsky and Neuenschwander (1999) considered the placement of
“ethics” and “technology” by imposing them on to Fogg‟s diagram of captology
(Figure_9).
More recently researchers have sought to define what ethics means to the user.
Kelly (2006) declared that he would accept technology if three out of the
following four conditions were met:
“I know what information is being collected, where, why and by whom
I assent to it either implicitly or explicitly and I am aware of it
I have access to correct it, and can use the data myself
4.2 Trust
Whilst some persuasive technologies may have a positive purpose, they can
negatively intrude into the lives of the users. Technological trust may be
influenced by a range of beliefs, attitudes, intentions, culture, knowledge of world
states, as well as the technology user‟s behaviour. Worldviews differ amongst
individuals colouring attitudes towards risks and benefits. By understanding what
trust means to potential users technology developers may gain greater insight
into the users‟ needs and wishes.
Trust is temporal in nature. It takes time to build and it must exist before
technology may be fully adopted and utilised. Whilst users may develop a
degree of trust in the infrastructure of technology over time, e.g. hardware and
mainstream software applications, potential CIMS users need to be assured that
the new system is trustworthy; that there is no difference between capability and
reliability. Trust is, however, not synonymous with user acceptance. Miller
(2005) purports that trust should be tuned to result in accurate usage decisions.
The quality and relevance of the technology‟s ability to gather data and draw
correct inferences will influence trust (Ijsselsteijn et al, 2006). Fairclough (2009)
emphasises how the sensitivity of a monitoring method is “a vital attribute” in
enabling the system to respond appropriately, e.g. being able to distinguish low
levels of frustration from high levels of frustration.
A Harris Poll (Taylor, 2003) found that the largest decline in privacy concern was
found among those who felt that “not being monitored at work is extremely
4.3 Purpose
Study participants had a pragmatic awareness that employers may not have the
resources to provide one-to-one DSE assessment of need and so interventions
such as CIMS may be considered as part of the overall approach to meeting
DSE Regulations and achieving employee well-being.
4.3.1 Consultation
Users need to understand how CIMS works in order to appreciate the range of
manipulations they may be subjected to (Fairclough, 2009). In order to
understand CIMS and be able to make an informed decision as to whether to
accept or reject its use, participants wanted to know more about the system(s);
what it was, how it worked and why it might be introduced.
By law employers must consult their employees on health and safety matters
(Health and Safety Executive, 2008), but not on all monitoring measures; unless
their use falls under specific legislation such as the Data Protection Act 1998 or
Human Rights Act 1998. The definition and purpose of CIMS is therefore vital to
the consultation process. The study has shown the participants‟ overwhelming
view that CIMS should support well-being and so CIMS must be placed in the
health and safety bracket.
Participant 1 reported that working alone, without social contact and feedback
provided from colleagues on how long she had been working, was a factor in her
own inability to manage her work/break habits. Ergonomics programs often
advocate Buddy Systems which enable colleagues to share information about
health and safety and so help foster a supportive environment (Ostrom et al,
2000). Use of CIMS as a social actor could provide lone workers with the benefit
of social support that a colleague might ordinarily supply (Olsen and Kraft, 2009).
CIMS ability to provide feedback will help the user know what to do in order to
make change. An archive facility enables her/him to review whether the
change(s) make any difference (Gravina et al, 2007). These facilities may help to
improve self-efficacy (perceived capabilities to attain specific goals or task
outcome).
4.4 Autonomy
4.4.1 Choice
The individual‟s ability to choose whether or not to use CIMS closely relates to
knowledge of its purpose and so will, in part, result from the consultation
process; which engenders empowerment and ownership. Without the
consultation process/knowledge of purpose, the ability to make a rational choice
4.4.2 Control
Another justification for user control was put forward by Participant 17, who
described stress as a motivator, “feel of adrenaline”. She questioned whether
CIMS should report stress in all circumstances. Rickenberg and Reeves (2000)
support this view stating that some arousal may be useful to determine what we
do, how we channel focus/attention. Participant 17 would be more concern if
stress levels did not reduce once a deadline/task had passed.
Tailoring CIMS approaches to the attitudes, beliefs and knowledge of the user
may enhance likelihood of increased well-being through the system-
recommended change being implemented (Whysall et al, 2007). One example of
this can be seen in terms of system feedback format, where participant
preference was quite varied. Studies have shown that where feedback is tailored
to reflect individual requirements/preferences relevance is increased, making it
easier for the user to comprehend and remember (Fogg, 1999; Dijkstra, 2006).
Providing the user with the ability to customise CIMS may result in increased
positive behaviour change.
4.5 Privacy
When asked about their attitude towards privacy, most participants initially
reported that it was of little concern to them; this despite previously voicing
concerns over data access rights, which implies issues with privacy control.
Participants‟ initial inability to perceive privacy issues with CIMS may be related
to analogical trust of the researcher, i.e. prior knowledge of the researcher
deemed her as trustworthy and that trust transfers to CIMS (Raab, 2007). As the
interview developed deeper into what might constitute privacy, participants
reported the following concerns/expectations with regards to CIMS:
i. That feedback from the system should not alert colleagues to potential
problems, which might result in embarrassment for the user (privacy as
personal dignity)
ii. That data may be taken out of context
iii. The potential to be identified through data held by the system, e.g. video
images, voice recordings (privacy as anonymity)
iv. That data recorded should be securely stored (security) and used
appropriately (support the employee); not mis-used
The first two points are perhaps more easily addressed. Point (i.) through CIMS
compliance with autonomy, as the user would be able to adjust the settings to
meet her/his privacy preferences, i.e. provide discreet text/symbolic messages
(Fairclough, 2009). Picard and Klein (2002) argue that control of the monitoring
function should always lie with the user. If data is taken out of context, point (ii.)
then there is the potential for discrimination if the individual is included in a
particular profile/classification. Providing context which the user may update
should s/he wish (proposed by Participant 15), may help to address this concern
(Bullington, 2005; Fairclough, 2009).
Points (iii.) and (iv.) fall under the category of data privacy; the expectation of
privacy in the collection and sharing of data about oneself. Concerns exist where
uniquely identifiable data relating to the individual are collected and stored.
Fairclough (2009) reported that “a technology designed to promote symmetrical
communication between user and system creates significant potential for
asymmetry with respect to data protection, i.e. the system may not tell the user
where his or her data are stored and who has access..”.
Participants voiced concerns over who would be given access to the information
and under what conditions. Ownership of data, i.e. does the individual own rights
to data, have rights to view, verify, change or challenge the data. The European
Union requires all member states to legislate to ensure that citizens have a right
to privacy. In the UK this is regulated by the Data Protection Act 1998. The Data
Protection Act gives individuals the right to know what information is held about
them; providing a framework to ensure that personal information is handled
properly (Information Commissioner, 2009). Such controls are designed to
Palen and Dourish (2003) argue that what is important is not what the
technology does, but rather how it fits into cultural practice. Privacy management
is a dynamic entity with, as the study participants demonstrated, individuals
responding to circumstances as they are presented rather than applying static
rules. An individual‟s need for privacy, if considered in isolation, may threaten
their chances of increasing their well-being, i.e. if the user‟s privacy needs are
met then s/he is more likely to accept CIMS and so benefit from it, whereas if
privacy needs are not met then the user is more likely to reject CIMS and so lose
any benefit it may bring. As individuals often rescind their right to privacy where
rewards may be gained (Acquisti and Grossklags, 2005), privacy concerns may
be balanced with the other barriers identified by the study. Consequenly, CIMS
should not be seen as an instrument through which privacy concerns are
reflected, but part of the wider circumstance within which the concerns of the
individual are formulated and interpreted.
In terms of readiness, the Stage of Change model is one way by which the
individual‟s potential for CIMS acceptance may be considered (Whysall et al,
2007). It works for Participant 21 who is not prepared to follow ill-health
preventative advice and may be firmly placed at pre-contemplation. According to
the other participants in this study the model does not tell the whole story.
Whysall et al (2007) found worker stage of change may be unrelated to their
perceived cost-benefit of MSD intervention. It is this very individualism of the
user which is at the centre of any health-related behaviour change.
Technology user acceptance models already exist, so why present a new one?
Previous models, such as the Technology User Acceptance Model (TAM)
(Davies, 1989), identified “perceived usefulness” (the degree to which a person
believes that using a particular system would enhance his or her job
performance) and “perceived ease of use” (the degree to which a person
believes that using a particular system would be free from effort) as factors in
user acceptance. A study by Venkatesh et al (2008) found negative association
with behavioural intention of using technology, i.e. if the user perceives the
technology as being difficult to use, then s/he is less likely to have a positive
attitude towards the concept. With regards to CIMS, apart from Participant 21
who flatly refused to countenance use of CIMS, the participants could all see the
potential for “usefulness” of CIMS, but “ease of use” was not raised by any of the
study‟s participants; this finding is supported by other studies (Keil et al, 1995;
Hu et al, 1999). Usefulness on its own does not explain the attitudes expressed
by the participants as to whether or not they would accept CIMS.
More recent studies have found that the type of technology impacts user attitude
and usage (Curran et al, 2005; Im et al, 2008). Due to the variety of influencing
factors involved, e.g. perceived risk, a sub-construct or antecedent of trust (Im et
al, 2008), attitudes towards different technologies used to deliver the same
service are discrete from each other. Whilst the identification of risk starts to
explain the findings of the present study, it does not go far enough. The present
study confirmed that technology cannot be viewed as a single homogeneous
group when considering user acceptance.
Taking the issues that surround persuasive technology into account, and by
applying the participants‟ themes to CIMS, the CIMS User Acceptance Model is
proposed. With trust as its bedrock, the model identifies purpose, autonomy, and
privacy as potential barriers to acceptance. At the core of the model is the user
(the individual, the self), who must not only establish her/his level of trust in
CIMS through interpretation of the barriers, but also consider how far s/he can
trust her/him “self” in coming to that decision (Figure_10 and Table_15).
Each potential user must be provided with sufficient information about CIMS and
its intended implementation in order to understand and interpret each of the
barriers as they may apply to her/him “self” (attitudes, beliefs, behaviours). This
will establish to what degree s/he trusts before acceptance may even start to
take place.
Potential
Barrier Definition Themes
User Individual who is a work-based computer Individual
user Self
Purpose A system designed to support the individual What, why
in the prevention/reduction of MSDs and how
Autonomy Providing the user with the ability to: Control
choose when/if the system is used Choice
control the system by configuring each
element to meet her/his personal and
work needs
Privacy Ability of the system to protect the user‟s
Security
data/identity to the user‟s satisfaction Who, how,
when
Trust The degree to which the user believes that Accuracy,
the system, its purpose and configuration, Agreement,
and those who support her/his use of it may Misuse,
be relied upon Relevance,
Reliability
Table_15: Components of the CIMS User Acceptance Model
Before Participant 31 is able to enter into a “contract” with CIMS, these and other
practical concerns need to be addressed. True levels of acceptance may only be
known if CIMS is developed and computer workers use it.
4.8.1 Self-reports
The HSE (2009) notes that whilst its figures come from self-reports and so “are
not an exact measurement of the true extent of work-related illness”, such self-
reports provide a reasonable indicator as they have previously confirmed
through “high levels of agreement between individuals and their general
practitioners” (GPs), with agreement being particularly high for cases of self-
reported stress, depression or anxiety and MSDs. This observation is supported
by studies such as that conducted by Deyo and Diehl (1983). As the majority of
survey participants were known to the researcher, the self-reports provided by
the survey could be verified through contact history, client case notes, and
further interrogation at the interview stage.
At the project planning stage it was envisaged that the survey would be
conducted during May and June of 2009. Due to unforeseen circumstances, the
survey was delayed until July, by which time many of those who had declared an
interest were no longer available. This reduced the sample size, the industry
sector spread and number of participants without symptom experience.
Consequently, the participants of this study do not represent a randomly
selected sample of work-based computer users.
As CIMS does not yet exist, participants may have swayed their responses in
favour of known aspects, e.g. posture/equipment use were perceived as being
more acceptable than those which involved emotion recognition, for which
participants had no frame of reference.
Whilst the study has begun to answer the questions that surround user
acceptance of CIMS, many remain unanswered. Some of these may offer
opportunities for further research.
4.9.1.1 Gender
Berkley (1997) found that sex differences in attitudes exist that affect not only
reporting, coping and responses to treatment, but also measurement and
treatment. At interview stage the female to male ratio was 11:2. Whilst the
comments of the two male interviewees were in line with those of the females,
repeating the study with a greater male population would confirm if gender bias
had any part to play in the study outcome.
By separating the user acceptance variables identified in this study from CIMS
(Figure_11), they may be applied to other forms of persuasive technology.
Further research would be needed in order to establish if all of the variables
remain potential barriers for different types of persuasive technology.
Analysis revealed that experience of symptoms does not mean that individuals
readily welcome intervention. A combination of knowledge, understanding, and
trust is required; in CIMS and all that it entails. From thematic analysis, five
potential barriers to user acceptance were identified: self (the user), purpose (of
CIMS), autonomy, privacy and trust. As represented by the CIMS User
Affective Computing Group. MIT. (2009). Retrieved 13th September 2009 from:
http://affect.media.mit.edu/index.php
Ahn, H., Teeters, A., Wang, A., Breazeal, C., Picard, R.W. (2007). Stoop to
conquer: Posture and affect interact to influence computer users‟
persistence. Paper presented at the Second International Conference
on Affective Computing and Intelligent Interaction, Lisbon, Portugal.
Ark, W.S., Dryer, D. C. and Lu, D. J. (1999). The Emotion Mouse. Proceedings
of HCI International (the 8th International Conference on Human-
Computer Interaction) on Human-Computer Interaction: Ergonomics
and User Interfaces-Volume I, 818-823
Armstrong, T. J., Buckle, P., Fine, L. J., Hagberg, M., Jonsson, B., Kilborn, A.,
Kuorinka, I. A. A., Silverstein, B. A., Sjogaard, G., and Viikari-Juntura,
E. R. A. (1993). A conceptual model for work-related neck and upper-
limb musculoskeletal disorders. Scandinavian Journal of Work,
Environment and Health. 19, 73-84.
Balci, R. and Aghazadeh, F. (2003). The effect of work-rest schedules and type
of task on the discomfort and performance of VDT users. Ergonomics,
46(5), 455-65
Banerjee, P and Sharan, D. (2003) Computer Users Falling Into Mousetrap. The
Times of India (31st March 2003). Retrieved 17th August 2009 from:
http://timesofindia.indiatimes.com/cms.dll/html/uncomp/articleshow?m
sid=41906870
Cordiner, L., Davies, S., Haines, H., Haslegrave, C., Hide, S., and Wilson, J.
(1998). “Ergonomics Application in the Workplace: A distance learning
course on the fundamentals and practice of ergonomics”. Nottingham:
Institute for Occupational Ergonomics, University of Nottingham.
de Rosis, F., Mazzotta, I., Miceli, M., and Poggi, I. (2006). Persuasion Artifices to
Promote Wellbeing. In IJsselsteijn, W. et al. (Eds.): PERSUASIVE
2006, LNCS 3962, pp. 84 – 95.
Galinsky, T., Swanson, N., Sauter, S., Dunkin, R., Hurrell, J., and Schleifer, L.
(2007). Supplementary Breaks and Stretching Exercises for Data
Entry Operators: A Follow-up Field Study. American Journal of
Medicine, 50, 519-527.
Grolleman, J., van Dijk, B., Nijholt, A., and van Emst, A. (2006). Break the Habit!
Designing an e-Therapy Intervention Using a Virtual Coach in Aid of
Smoking Cessation. In IJsselsteijn, W. et al. (Eds.): PERSUASIVE
2006, LNCS 3962, pp. 133-141.
Guardian, The (2009). “Sick leave is a problem for managers”. Retrieved 10th
September 2009 from:
http://www.guardian.co.uk/society/joepublic/2009/aug/21/sick-leave-
managers-problem
Hareli, S., and Rafaeli, A. (2008). Emotion cycles: On the social influence of
emotions in organizations. Research in Organizational Behavior, 28,
35-59
Haslegrave, C. and Corlett., N (2005). Work conditions and the risk of injury. In:
Evaluation of Human Work. Ed. Wilson, J. R. and Corlett, N. Chapter
31, p809-823. CRC press, Taylor & Francis Group, Boca Raton,
Florida, USA
Health and Safety Executive. (2002). Health and Safety (Display Screen
Equipment) Regulations 1992 as amended by the Health and Safety
(Miscellaneous Amendments) Regulations 2002. Norwich: HSE Books
Henning, R.A; Sauter, S.L; Salvendy, G and Krieg, E.F (1989) Microbreak
length, performance, and stress in a data entry task. Ergonomics, 32
(7) ,855-864
Henning, R.A, Callaghan, E.R, Ortega, A.M, Kissel, G.V, Guttman, J.I and
Braun, H.A. (1996). Continuous feedback to promote self-
management of rest breaks during computer use. International Journal
of Industrial Ergonomics 18, 71-82
Hu, P. J., Chau, P. Y. K., Liu Sheng, O. R. and Yam Tam, K. (1999). Examining
the technology acceptance model using physician acceptance of
telemedicine technology. Journal of Management Information
Systems, 16(2), 91-112
Im, I., Kim, Y. And Han, H-J. (2008). The effects of perceived risk and
technology type on users‟ acceptance of technologies. Information and
Management. 45, 1-9.
IJsselsteijn, W., de Kort, Y., Midden, C., Eggen, B., and van den Hoven, E.
(2006). Persuasive Technology for Human Well-Being: Setting the
Scene. IJsselsteijn, W. et al. (Eds.): PERSUASIVE 2006, LNCS 3962,
pp. 1–5
Lu, X., Toivonen, R., and Takala, E-P. (2009). Exploring Time-Dependent
Symptoms Outcomes in Office Staff. Human Factors and Ergonomics
Manufacturing. 19(23), 241-252
Marcus, G. M., Cohen, J. C., Varosy, P. D., Vessey, J., Rose, E., Massie, B. M.,
Chatterjee, K., and Waters, D. (2007). The Utility of Gestures in
Patients with Chest Discomfort. The American Journal of Medicine,
120, 83-89.
Montreuil, S., LaFlamme, L., Brisson, C. and Teiger, C. (2006). Conditions that
influence the elimination of postural constraints after office employees
working with VDU have received ergonomics training. Work, 26, 157-
166.
Morris, D., Bernheim Brush, A.J., and Meyers, B. R. (2008). SuperBreak: using
interactivity to enhance ergonomic typing breaks. In Proceeding of the
twenty-sixth annual SIGCHI conference on Human factors in
computing systems, April 05-10, 2008, Florence, Italy
Morse, T., Dillon, C., Warren, N., Hall, C. and Hovey, D. (2001). Capture-
recapture Estimation of Unreported Work-Related Musculoskeletal
Disorders in Connecticut. American Journal of Industrial Medicine, 39,
636-642.
Obermair, C., Reitberger, W., Meschtscherjakov, A., Lankes, M., and Tscheligi,
M. (2008). perFrames: Persuasive Picture Frames for Proper Posture.
Oinas-Kukkonen, H. Et al (Eds) In: Persuasive 2008, pp128-139
Patient UK: Repetitive Strain Injury – RSI Retrieved 19th August 2009 from:
http://www.patient.co.uk/health/Repetitive-Strain-Injury-RSI.htm
Picard, R. (2001). “Building HAL: Computers that sense, recognize and respond
to human emotion”. Retrieved 16th September 2009 from:
http://vismod.media.mit.edu/tech-reports/TR-532.pdf
Raab, C. D. (2007). Trust, Technology and Privacy. End and Means, Journal of
University of Aberdeen, Centre for Philosophy, Technology and
Society, 3(1).
Statutory Instrument (1992) No. 2792: The Health and Safety (Display Screen
Equipment) Regulations 1992. Retrieved 26th August 2009 from:
http://www.opsi.gov.uk/si/si1992/Uksi_19922792_en_1.htm
Tan, H. Z., Slivovsky, L. A., and Pentland, A. (2001). A Sensing Chair Using
Pressure Distribution Sensors. IEEE/ASME Transactions on
Mechatronics, 6 (3), 261-269
Taylor, H. (2003). Most People Are “Privacy Pragmatists” Who, While Concerned
about Privacy, Will Sometimes Trade It Off for Other Benefits. Harris
Poll #17 Retrieved 24th September 2009 from:
http://www.harrisinteractive.com/harris_poll/index.asp?PID=365
Trade Union Congress (TUC) (2004). RSI Day – workforce warned on dangers
of RSI. TUC. Risks 145. Retrieved 17th August 2009 from:
http://www.tuc.org.uk/h_and_s/tuc-7706-f0.cfm#f2
Turk, D. C. (1993). Assess the Person, Not Just the Pain. Pain: Clinical Updates,
International Association for the Study of Pain. 1(3)
Westin, A. (1970). Privacy and Freedom. The Bodley Head Ltd, London, UK
Westman, A.S.J., Linton, A.S.J., Öhrvik, J., Wahlén, P., and Leppert, J., (2008).
Do psychosocial factors predict disability and health at a 3-year follow-
up for patients with non-acute musculoskeletal pain? A validation of
the Örebro Musculoskeletal Pain Screening Questionnaire. European
Journal of Pain, 12 (5), 641–649.
The project poses the following question: “If your work-based computer could
warn you that you might be putting yourself at risk (through posture, work habits
and/or changes to your emotional-state) would you want it to?” The first stage of
the study is a survey; a copy of which is attached (MS Word format).
Please do not hesitate to contact me should you have any questions regarding
the study or survey.
“If the computer could warn you that your working habits,
posture, and/or emotional state might be putting you at risk of developing or
aggravating symptoms,
e.g. stress, headaches, eyestrain, physical discomfort,
would you want it to and, if so,
what monitoring methods would you find acceptable?”
I am looking for study participants and would be grateful if you would take part by
completing the attached questionnaire; it should take about 20 minutes. You are
free to skip questions which you do not wish to answer or to stop at any time;
there is no need to give a reason. You will see that the survey asks you to
provide your contact details (name and email address and/or telephone number);
this is so that I may invite some participants to take part in a more in-depth
interview process. Completing the survey does not, however, oblige you to take
part in the interview stage. Again, you are completely free to decline to take part
or to stop at any time.
The next page provides you with more information on the study, my contact
details and those of my project supervisors. Please do not hesitate to contact us
should you have any questions.
We would like to invite you to participate in this research project. Before you decide
whether you would like to take part, please read the following information carefully
and, should you wish, discuss it with others. Please feel free to ask us if there is
anything that is not clear or if you would like more information.
Details of Study
This is an exploratory study to consider work/office-based computer users‟ attitudes to
risk in the context of work-related computer use and their acceptance levels of
technology-based interactive affect and ergonomic monitoring systems to support the
prevention, reduction and possible recovery from symptoms which may be
exacerbated by computer use. The study aims to consider:
– If the computer could warn the user that s/he might be putting her/himself at risk,
would the user want it to?
– What risks would users want the computer to detect?
– What monitoring and/or detection methods would users welcome/tolerate/reject?
– What advice provision methods would users welcome/tolerate/reject?
– Are users influenced by previous or existing symptoms?
– Does work location have an impact on views?
The first stage of the study is the completion of a questionnaire. Based on your
feedback you may then be invited to take part in an interview. The venue for the
interview will be of your choosing. Ideally the interview will include a visit to your
workstation(s) so that your computer set-up and working posture may be observed
and, with permission, digitally recorded (photographed).
Participation
If you decide to take part in the survey you may skip any questions which you would
prefer not to answer. You are free to withdraw at any time; without giving a reason. All
data will be collected and stored in accordance with the Data Protection Act 1998 and
it will not be possible to identify you from any publication.
This section asks about you, your job and your computer use.
1. Name:
___________________________________
2. Email address:
___________________________________
3. Telephone Number:
___________________________________
4. Gender
a) Female
b) Male
5. Age
a) 18-20
b) 21-30
c) 31-40
d) 41-50
e) 51-60
f) 61-65
g) Over 65
6. Job title:
___________________________________
7. Industry Sector:
a) Public
b) Private
c) Not-For-Profit / Charity
d) Other…. Please explain:
14. What might be the longest length of time you spend working at your
computer before taking a break, i.e. short break away from the
computer for telephone calls, paperwork, filing, photocopying, comfort
break?
a) Less than one hour
b) Between one and two hours
c) Between two and three hours
d) Three hours or more
COMMENT:
If you do not have a standard keyboard, please explain why, e.g. did you
inherit it, chose it, or was it provided for a specific reason?
If you do not have a standard mouse, please explain why, e.g. did you inherit
it, chose it, or was it provided for a specific reason?
20. Does your company provide you with Display Screen Equipment (DSE)
Workstation Assessments?
This the process by which the health, safety and comfort of each employee
who uses a computer may be considered; with appropriate action being taken
to rectify any problems identified
a) Yes
b) No
c) Don‟t know
COMMENT:
23. Did the assessment result in any changes to your furniture or computer
equipment?
a) Yes
b) No
c) Can‟t remember
24. Did the assessment result in any recommendations for you to change
your working habits, e.g. vary your work tasks more frequently, take
more regular breaks from the computer, conduct stretching exercises,
etc.
a) Yes
b) No
c) Can‟t remember
25. Have you ever used a work, ergonomic or symptom break reminder
utility such as: Break Reminder, MacBreakZ, RSIGuard, WorkPace,
WorkRave? These software utilities prompt the user to take a break and/or
conduct gentle stretching exercises
a) Yes
b) No
g) Don‟t know
COMMENT:
If you answered (b) “No” or (c) “Prefer not to answer” to Question 26,
please go to:
Section 3 (Designing For User Need) – found on Page 13
This section asks about any symptoms that you have (or have had in the
past) which you attribute to or which you believe may be aggravated by
computer use.
28. Please indicate which area(s) bother you (Please select all that apply)
a) Head (e.g. headache, migraine)
b) Eyes (e.g. hot, sore, tired, stinging, dry, weeping eyes; eyestrain)
c) Neck
d) Shoulder
e) Shoulder blade
f) Upper back
g) Lower back
h) Hips
i) Buttocks, coccyx or seat/sit bones
j) Thigh(s)
k) Knee(s)
l) Calf, ankle/Achilles‟ tendon, heal or foot
m) Upper arm
n) Elbow
o) Forearm
p) Wrist
q) Hand
r) Finger
s) Thumb
t) Joints
u) Stress or tension
v) Excessive tiredness
w) Other…. Please explain:
30. For the area which bothers you MOST, which of the following
describe(s) your symptoms (Please select all that apply):
a) Aching
b) Burning
c) Cramping
d) Discomfort
e) Dull
f) Nagging
g) Numbness
h) Pain
i) Sharp
j) Stiffness
k) Swelling
l) Tense
m) Tingling / pins and needles
n) Weakness
o) Other…. Please explain:
If you answered (i) “No one”, please explain your reasons for this:
32. Have you received/used any of the following? (Please select all that
apply)
a) Medical diagnosis
b) Prescription Medication
c) Over-the-counter medication
d) Aids / supports: tubi-grip/strapping, hand/wrist splint; back belt; walking
stick etc.
e) Therapeutic treatment, e.g. physiotherapy, osteopathy, chiropractic
treatment, acupuncture, Alexander Technique
f) Relaxation methods and related exercises, e.g. Yoga. Pilates, Tai Chi
g) Relaxation techniques, e.g. meditation, aromatherapy
h) Sports and related exercise, e.g. swimming, gym, step class
i) Other…. Please explain:
33. Has your workstation furniture (e.g. chair, desk) been adapted in any
way to help with your symptoms?
a) Yes
b) No
If you answered (a) “Yes”, please explain what changes have been
made, how they came about and if they have been of any help
If you answered (a) “Yes”, please explain what changes have been
made, how they came about and if they have been of any help
NOTE: Questions 35, 36, and 37 appear to be the same, but they are not.
In turn, they ask you to consider whether you would “welcome”,
“tolerate” or “reject” the monitoring methods described
37. Would you REJECT (refuse to use) any of the following detection
methods (Please select all that apply)
a) Keyboard use (e.g. key action (force/pressure used), position of keyboard
on work surface)
b) Pointing device use (e.g. hand/finger pressure on device, grip position,
button action (force/pressure used) speed and range of movement,
position of device on work surface)
c) Head position in relation to monitor (e.g. distance from screen)
d) Seated position (e.g. fully in chair with back supported, perched, fidgeting)
e) Upper body posture (e.g. leaning towards the screen, leaning to one side)
f) Facial expression (e.g. frowning, eyebrow positions)
g) Eye size (e.g. changes can indicate mood)
h) Eye gaze (e.g. rapid movement, lack of movement, tracking eye gaze
across screen)
i) Voice monitoring, e.g. detecting the volume of your speech, tone, words
used etc.
j) None
Please explain your reasons for rejecting this method (s) and then go to
Question 39:
38. From those methods which you would either WELCOME or TOLERATE,
which detection method would you find MOST acceptable?
(Please select just ONE)
a) Keyboard use (e.g. key action (force/pressure used), position of keyboard
on work surface)
b) Pointing device use (e.g. hand/finger pressure on device, grip position,
button action (force/pressure used) speed and range of movement,
position of device on work surface)
c) Head position in relation to monitor (e.g. distance from screen)
d) Seated position (e.g. fully in chair with back supported, perched, fidgeting)
e) Upper body posture (e.g. leaning towards the screen, leaning to one side)
f) Facial expression (e.g. frowning, eyebrow positions)
g) Eye size (e.g. changes can indicate mood)
h) Eye gaze (e.g. rapid movement, lack of movement, tracking eye gaze
across screen)
i) Voice monitoring, e.g. detecting the volume of your speech, tone, words
used etc.
40. If you have rejected all of the monitoring methods listed in Question 37,
please explain your reasons for this:
The next stage of this research project involves interviews with selected
survey participants
Ideally, to facilitate observation of the participant at her/his workstation,
interviews will take place at the participant‟s place of work. If a workplace
interview is not possible, then the location will be of the participant‟s choosing
The interviews will take place during July and the early part of August (no
later than the Bank Holiday weekend) and will be arranged to suit each
participant‟s availability
Would you be willing to take part in the interview stage of this project?
a) Yes
b) No
c) Undecided
COMMENTS:
If you wish to, please use the space below to provide any additional
thoughts / comments you may have on the topics raised by this survey, or
on the survey itself…….
NOTE:
For the purposes of the study this form was printed with smaller
margins. As a result, the text and line spacing were not as cramped
as they appear here.
Participant’s Statement:
I ……………………………………………………(please print your name here)
agree that (please cross through those points which you do not agree with / consent to)
I have read the information sheet and/or the project has been explained to
me orally;
I have had the opportunity to ask questions and discuss the study/project;
I have received satisfactory answers to all my questions or have been
advised of an individual to contact for answers to pertinent questions about
the research and my rights as a participant and whom to contact in the event
of a research-related problem;
I understand that the information I submit during the survey and/or interview
process may be published in the study report and that, on request, I will be sent a
copy. Confidentiality and anonymity will be maintained and it will not be possible
to identify me from any publications;
I consent to the information I provide being digitally recorded (audio) and used for
the purposes of the study, i.e. transcription, analysis and use within the report;
Where they exist, I consent to existing digital photographs of me at my
workstation being used for the purposes of this study, i.e. for analysis and
comparison purposes. Photographs which include facial images will be edited so
that it will not be possible to identify me;
Where they exist, I consent to existing digital photographs of me at my
workstation being published in the study report. Photographs which include facial
images will be edited so that it will not be possible to identify me;
Where they exist, I consent to existing digital photographs of me at my
workstation being used for post-study purposes, e.g. publication in journals,
reports, conferences. Photographs which include facial images will be edited so
that it will not be possible to identify me;
I consent to the information I submit being used for post-study purposes, e.g.
publication in journals, reports, conferences;
I understand that I am free to withdraw from the study at any time;
I consent to the processing of my personal information for the purposes of this
study only and that it will not be used for any other purpose. I understand that
such information will be treated as strictly confidential and handled in accordance
with the provisions of the Data Protection Act 1998.
Signed: Date:
Investigator’s Statement:
I, Jan Mulligan, confirm that I have carefully explained the purpose of the study to the
participant and outlined any reasonably foreseeable risks or benefits (where applicable).
Signed: Date:
Taking into account the statement shown above, please consider the example
questions based on your experience of using computers in a workplace setting
and your attitude to related risk. The questions are designed to act as a guide
for the interview, not to restrict it. Some of the questions appear to ask for yes/no
responses or that you make a selection from a list of choices. I do, however,
hope to elicit more information from you based on your thoughts on the topics
and reasons for your responses. I also hope that we may explore other areas of
interest as they emerge from our discussion.
Participation:
Before the interview starts you will be given the opportunity to ask any
questions that you may have and you will be asked to sign a consent form
which I will bring with me (a copy of the form will be sent to you, for
references purposes, ahead of the session).
Please be assured that outside of the correspondence between us your
confidentiality and anonymity will be maintained; it will not be possible to
identify you from any publications.
You are free to skip any question(s) which you do not wish to answer or to
stop the interview at any time; there is no need to give a reason.
Should we not have time to complete the interview within the allocated time
then, with your agreement, we may complete the interview through
subsequent email or telephone contact.
A) Symptoms:
1. If you experience symptoms whilst working (or as a result of working), e.g.
stress, headaches, eyestrain, physical discomfort, how/what does that
make you feel? Please select all that apply:
Annoyed Comforted Horrified Impatient Thoughtful
Uneasy Guilty Sceptical Worried Ineffectual
Relaxed Proud Indifferent Apologetic Depressed
Bored Amused Decisive Sympathetic Grateful
Upset Irritated Dispirited Sad Despondent
Regretful Preoccupied Alarmed Relieved Playful
Encouraged Disappointed Justified Doubtful Impatient
Pensive Reassured Happy Anxious Angry
Confused Fear Rage Flustered Excited
Despair Satisfaction Disgust Defiant Shame
Surprised Joyful Curious Weak Frustrated
Inefficient Supported Compromised Rested Contempt
Other, please explain…..
2. Do your symptoms impact on your life outside of work? If “yes”, how does
that make you feel?
B) Strategies:
1. What coping strategies, other than technical adaptations, have you tried /
do you currently use?
2. Have they been / are they: more, less or equally beneficial than the
technical adaptations?
3. How do you measure the success of a strategy?
C) If you decide to take a work or rest break away from your computer,
how/what does that make you feel? Please select all that apply:
Annoyed Comforted Horrified Impatient Thoughtful
Uneasy Guilty Sceptical Worried Ineffectual
Relaxed Proud Indifferent Apologetic Depressed
Bored Amused Decisive Sympathetic Grateful
Upset Irritated Dispirited Sad Despondent
Regretful Preoccupied Alarmed Relieved Playful
Encouraged Disappointed Justified Doubtful Impatient
Pensive Reassured Happy Anxious Angry
Confused Fear Rage Flustered Excited
Despair Satisfaction Disgust Defiant Shame
Surprised Joyful Curious Weak Frustrated
Inefficient Supported Compromised Rested Contempt
Other, please explain…..
F) System feedback methods: Please see IMAGE sheet for examples of the
options……
1. Which of the following would you accept (welcome, tolerate, prefer) or
reject and why:
a) On-screen text messages
b) Option a, with animated cartoon-style character
c) Option a, with drawing/sketch support
d) Option a, with animated drawing/sketch support
e) Option a, with virtual assistant support
f) Option a, with animated/video-based virtual assistant support
g) Your choice from options a-f, plus natural voice audio
h) Your choice from options a-f, plus computer-generated audio
i) Natural voice audio only (no on-screen text)
j) Computer-generated audio message only (no on-screen text)
k) Other, please explain……
I) Privacy:
1. In principle, would use of an interactive affect and ergonomic monitoring
system give you cause for concern about your privacy? Please explain…
Keyboard use
(e.g. key action (force/pressure used), position of keyboard on work
surface, number of presses)
Seated position
(e.g. fully in chair with back supported, perched, fidgeting)
Facial expression
(e.g. frowning, eyebrow positions)
Eye size
(e.g. changes can indicate mood)
Eye gaze
(e.g. rapid movement, lack of movement, tracking eye gaze across
screen)
Voice monitoring
(e.g. detecting the volume of your speech, tone, words used etc)
L) Do you think that your responses to the survey or the questions posed
today:
1. Have been influenced by anything? Example reasons might include:
existing or historic symptoms
previous experience of monitoring systems (e.g. direct exposure,
witnessing someone else using one, anecdotal)
your work location
the industry you work in
your employer
other....
2. Would change if you were considering your personal computer use, i.e.
home-based / non-work computer use? If “yes”, why, how?
NOTE:
During the interviews larger versions of the images were shown to
the participant (one image at a time).
Photograph_13
Survey Comments
P17(F) “We put some health and safety policies in place and I go through
basic workstation assessments with every new employee – but don‟t
think it is a formal DSE as such”
P18(F) “Only people who have/develop problems might get offered one”
P26(F) “I don‟t know that I have ever had a DSE – I had never heard of it till
this moment.”
(time in current job is reported as being “between 6 and 12 months in
role, but with the employer for over 12 years”)
P29(M) “Never”
(time in current job is reported as being “more than one year”)
Appendix_6b:
Survey Question 31, “Have you discussed your symptoms with....”
P30(F): “Not entirely sure of the cause, but think it‟s the way I sit and use my
right arm”
P34(M): “It wears off overnight so assume as not too serious I think”
P18(F): “I would like to be reminded to take a break from using the mouse
when a particular job requires a lot of mousing”
P25(F): “Some way of looking at the type of work being done, e.g. intense
focus of a spreadsheet is a bit different from reading your emails”
P32(M): “Simply telling you how long you have been at the keyboard /
computer”
Appendix_6d:
Final Comments:
P7(F): “In many cases, I feel the computer user is probably aware of what
causes pain, etc. and could probably help themselves! However,
some employers are not always in a rush to provide an audit, or other
equip to alleviate symptoms”
P13(F): “I suppose my main issue with such computer use is the amount of
strain on the eyes but I was not sure if this could be monitored through
the „Eye size‟ or „eye gaze‟ part of monitoring..... “.
P17(F): “I think this could be really useful, but I have a sort of horror vision of
my computer turning into my Mum and nagging me to sit up straight,
smile, be polite, etc. which I found deeply irritating and rather
patronising even when I was a child! It could be quite fun if it was a bit
ironic with warnings and danger levels – “risk of pain level 5 occurring
in 10 minutes” – like something off ER or in a submarine”
P18(F): “A lot of people where I work are only using computers to put in info, or
collate data and most of them have had no training whatsoever, and
no idea that the way they are sitting, keyboarding or mousing cause
aches they might be experiencing....”.
P26(F): “My husband works writing software which enables, for example,
teachers to see what their students have got going on their screens
etc, and also enables employers to see what employees are doing on
their desktops or networked laptops. Its nickname is „master-and-
slave‟ and there‟s something not quite all right about computers
keeping such a close eye on us. I think I would rather learn to spot my
own physical stillness and get moving”